CN101345618A - Encryption and decryption method for four-item weight FRFT communication based on variable parameter - Google Patents

Encryption and decryption method for four-item weight FRFT communication based on variable parameter Download PDF

Info

Publication number
CN101345618A
CN101345618A CNA2008101369412A CN200810136941A CN101345618A CN 101345618 A CN101345618 A CN 101345618A CN A2008101369412 A CNA2008101369412 A CN A2008101369412A CN 200810136941 A CN200810136941 A CN 200810136941A CN 101345618 A CN101345618 A CN 101345618A
Authority
CN
China
Prior art keywords
sequence
parameter
dynamic
frft
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008101369412A
Other languages
Chinese (zh)
Other versions
CN101345618B (en
Inventor
沙学军
梅林�
宁晓燕
史军
吴少川
高玉龙
白旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
Original Assignee
Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology filed Critical Harbin Institute of Technology
Priority to CN200810136941A priority Critical patent/CN101345618B/en
Publication of CN101345618A publication Critical patent/CN101345618A/en
Application granted granted Critical
Publication of CN101345618B publication Critical patent/CN101345618B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to encryption and decryption method for tetrachoric weighting FRFT communication, belonging to communication field. In the existing technology, non target receiver can decipher enciphered signal by scanning one by one of enciphered parameter when known transmitter enciphered signal by tetrachoric weighting FRFT. To solve the above-mentioned problem, the inventive method comprises that data source is modulated at transmitter by base band to deliver to encipher module which executes tetrachoric weighting FRFT controlled under alpha, MV and NV determined by pseudorandom code and matched parameter change pattern, enciphered signal modulated by digital carrier is delivered to channel for transmitting via D/A conversion and up converter; data collected by down converter and A/D is delivered to decription module for digital carrier coherent demodulation, deciphered signal is obtained after tetrachoric weighting FRFT controlled by alpha, MV and NV determined by parameter change pattern, and pseudorandom code, then base band demodulation is operated.

Description

Based on maintaining secrecy and decryption method of the four-item weight FRFT of variable element communication
Technical field
The present invention relates to communication technical field, be specifically related to the signal processing and maintaining secrecy and decryption method of communicating by letter of FRFT (fractional Fourier transform).
Background technology
FRFT is a kind of important time frequency analyzing tool, has obtained comparatively extensive studies in the last few years, and is used in some field of engineering technology.FRFT is the popularization to traditional Fourier transform, and its essential characteristics can be understood as the fractionation to the Fourier transform characteristic value.The continuity of parameter value, rotation additivity and be the fundamental property of FRFT to the uniformity of signal time-frequency form.FRFT roughly is divided into: classical class FRFT and weighting class FRFT.
Classical class FRFT is a kind of FRFT form that proposes relatively early, and it is promoted with complete directly from Fourier transform integral kernel and characteristic value.Because the orthogonal basis of classical FRFT with chirp (Qie Pu) form, thereby the classical class FRFT chirp class FRFT that is otherwise known as.Research and application about FRFT at present concentrates on the classical class mostly, and classical FRFT has application more widely in finding the solution scientific researches such as the differential equation, quantum mechanics, signal analysis and processing; The engineering aspect is to utilize classical FRFT the earliest as optical correlation fields such as optical communication system, light image processing, also is that application is the most successful at present.But be subject to the discrete logarithm problem of classical FRFT, its application in the communications field has been subjected to bigger restriction.
Weighting class FRFT (WFRFT) is a kind of new mathematical tool that is different from classical class FRFT, its mathematical property has obtained good embodiment in optical system, and can be realized by simple optics, thereby in Information Optics, be used widely.
Along with going deep into that FRFT is studied, the definition of WFRFT is constantly promoted, and unified with classical class FRFT to a certain extent.WFRFT definition form goes for any periodic conversion that has.Utilize this character, continuous WFRFT definition can be generalized to the WFRFT of discrete series.
The continuous four-item weight score Fourier conversion (4-WFRFT) of tradition is defined as:
F α[f(t)]=a 0(α)f(t)+a 1(α)F(t)+a 2(α)f(-t)+a 3(α)F(-t)
A wherein 0~a 3Be the weight coefficient by the control of dynamic encryption parameter alpha, the form of embodying is:
a l ( α ) = cos ( ( α - l ) π 4 ) cos ( 2 ( α - l ) π 4 ) exp ( ± 3 ( α - l ) πi 4 ) , ( l = 0,1,2,3 )
The value cycle of dynamic encryption parameter alpha is 4, and the span of setting α here is any real number between [0,4] or [2,2], for the real number outside the span, and weight coefficient a l(l=0,1,2,3) will present cyclic variation along with α.The result of 4-WFRFT is f (t) when α=0, and the result of 4-WFRFT is F (t) when α=1.Wherein f (t) is the function that is transformed, and f (is the counter-rotating function at center with the initial point for f (t) t); F (t) becomes the right function of Fourier transform with f (t), and F (is the counter-rotating function at center with the initial point for F (t) t).
The 4-WFRFT of the discrete series of being promoted by the continuous 4-WFRFT of tradition is defined as:
F α[x(n)]=w 0(α)x(n)+w 1(α)X(k)+w 2(α)x(-n)+w 3(α)X(-k)
Wherein
w l ( α ) = 1 4 Σ i = 0 3 exp { ± 2 πi 4 [ ( 4 m i + 1 ) α ( k + 4 n i ) - lk ] } , ( l = 0,1,2,3 )
Be by α, MV=[m 0, m 1, m 2, m 3] and NV=[n 0, n 1, n 2, n 3] the common weight coefficient form of controlling of these 9 parameters, wherein MV and NV are real vector.When MV and NV are 0, w lWith a lDefinition coefficient equivalence.X (n) and X (k) are that discrete Fourier transform (DFT) (DFT) is right, and DFT adopts following formal definition:
X ( k ) = 1 N Σ n = 0 N - 1 x ( n ) e - j 2 π N kn x ( n ) = 1 N Σ k = 0 N - 1 X ( k ) e j 2 π N kn
The 4-WFRFT of the discrete series of promoting has inherited all character of traditional continuous 4-WFRFT, can come the rotation of the periodicity and the characteristic vector of control change in addition by the adjustment to real vector M V and NV.In a word, the 4-WFRFT of the discrete series of popularization is complicated more, but more complete in theory, and is more flexible and changeable during practical application.
Application number is 200810063871.2, exercise question is the patent application of " a kind of communication security and decryption method based on four-item weight score Fourier conversion ", when non-purpose receiver known transmitter employing is that four-item weight score Fourier conversion carries out signal encryption, when particularly encryption parameter is comparatively simple, non-purpose receiver just can crack coded signal by encryption parameter is scanned one by one, thereby obtains actual signal.
Summary of the invention
The objective of the invention is for solving what adopt when non-purpose receiver known transmitter is that four-item weight score Fourier conversion carries out signal encryption, when particularly encryption parameter is comparatively simple, adopt a kind of communication security and non-purpose receiver of decryption method just can crack coded signal by encryption parameter is scanned one by one based on four-item weight score Fourier conversion, thereby obtain the problem of actual signal, the existing secret and decryption method that proposes based on the four-item weight FRFT communication of variable element.
The secret of four-item weight FRFT communication based on variable element of the present invention realized by following steps with decryption method: at transmitter terminal, data source is given encrypting module through after the baseband modulation, encrypting module carries out four-item weight score Fourier conversion to data under the control of dynamic encryption parameter alpha, the real vector M V of dynamic encryption and NV, transmit through sending into channel after the upconverter through the D/A conversion through the coded signal behind the digital carrier modulation module again; At receiver end, be sent to deciphering module through the data after low-converter and the A/D sampling, in deciphering module, at first pass through digital carrier coherent demodulation module, then after the four-item weight score Fourier conversion that the dynamic deciphering parameter-α of process, the closely knit vector M V of dynamic resolution, NV control again, obtain decrypted signal, carry out base band demodulating work then; Real vector M V of described dynamic encryption parameter alpha, dynamic encryption and NV, dynamically deciphering parameter-α and the closely knit vector M V of dynamic resolution and NV all uses the dynamic parameter selection module of same structure to realize encrypting or deciphering parameter dynamically changes work, this change all is to produce by the pseudo noise code of special speed with parameter changing pattern that pseudo noise code adapts.
In the present invention, on the selection principle of dynamic encryption parameter alpha any real number, but because periodic the existence, α chooses the real number between [0,4] or [2,2] usually.For fixing α, have only the criterion of an optimum to recover original information signal in theory from the signal after encrypting, promptly the signal after encrypting is done the four-item weight class fractional Fourier transform of parameter for-α.Because the flexibility that α selects makes system user to encrypt signal according to the different encryption parameter of actual conditions Dynamic Selection.When selection of parameter is proper, coded signal will present class Gauss's distribution character.
In order to resist of the scanning of non-purpose receiver, introduce real vector M V of dynamic encryption and NV to encryption parameter α.When dynamic encryption reality vector M V=NV=0, when if input signal is the random signal of process digital modulation (MPSK or MQAM), change along with parameter alpha, the real part of signal and imaginary part will be distinguished Gaussian distributed after the conversion, these characteristics make the signal after the conversion have and the white Gaussian noise similarity, and then can play the effect of signal encryption; When the real vector M V of dynamic encryption and NV are not zero entirely; signal after the conversion will present more complicated variation; can be so that the variation of " constellation division " appears in the signal after the conversion; and then with the camouflage after modulation constellation protect original modulation intelligence; just the number of constellation points of Ju Jiing is counted many than modulation constellation before encrypting; utilize this characteristic can confuse non-purpose receiver, make it do the judgement that makes mistake.
Advantage of the present invention is: directly the 4-WFRFT with discrete series is incorporated in the communication system, can under the condition of occupying volume external spectrum resource not, encrypt data-signal, the complexity and the fast fourier transformation algorithm of its realization are suitable, and it is less to take system hardware resources, are easy to realize.The core cell of encrypt and decrypt is identical, it all is the four-item weight score Fourier conversion module, so multiplexing when being easy to duplex communication, owing to adopted the variation of pseudo random sequence control encrypt and decrypt parameter, make that the variation of encrypting the back signal is complicated more, be difficult to be cracked by direct parameter scanning.
Description of drawings
Fig. 1 is based on the structural representation of the secure communication device of variable element four-item weight class fractional Fourier transform; Fig. 2 is the schematic diagram of the dynamic change strategy of dynamic encryption parameter alpha, transverse axis express time wherein, and the longitudinal axis is represented encryption parameter; Fig. 3 is that each isolated component in real vector M V of dynamic encryption and NV adopts same PN sequence, and the PN sequence is in the period T of parameter saltus step CIn 4 frame period T are arranged FThe time, the schematic diagram of the variation strategy of real vector M V of dynamic encryption and NV; Fig. 4 is that each isolated component in real vector M V of dynamic encryption and NV adopts same PN sequence, and the PN sequence is in the period T of parameter saltus step CIn 16 frame period T are arranged FThe time, the schematic diagram of the variation strategy of real vector M V of dynamic encryption and NV; Fig. 5 is the schematic diagram of the variation strategy when the real vector M V of dynamic encryption adopts different PN sequences with each isolated component among the NV or adopt the different original position of same PN sign indicating number.
Embodiment
Embodiment one: present embodiment is described below in conjunction with Fig. 1.Present embodiment realizes by following step with decryption method by described the secret of four-item weight FRFT communication based on variable element: at transmitter terminal, data source is given encrypting module through after the baseband modulation, encrypting module carries out four-item weight score Fourier conversion to data under the control of dynamic encryption parameter alpha, the real vector M V of dynamic encryption and NV, transmit through sending into channel after the upconverter through the D/A conversion through the coded signal behind the digital carrier modulation module again; At receiver end, be sent to deciphering module through the data after low-converter and the A/D sampling, in deciphering module, at first pass through digital carrier coherent demodulation module, then after the four-item weight score Fourier conversion that the dynamic deciphering parameter-α of process, the closely knit vector M V of dynamic resolution, NV control again, obtain decrypted signal, carry out base band demodulating work then; Described dynamic encryption parameter alpha, the real vector M V of dynamic encryption and NV, dynamic deciphering parameter-α, the closely knit vector M V of dynamic resolution and NV all can use the dynamic parameter selection module of same structure to realize that encryption or deciphering parameter dynamically change work, they all are the pseudo noise codes by the special speed of clock source control pseudo-code generator output, and be stored in the command decoder the common decision of parameter changing pattern that the pseudo noise code with described special speed adapts, according to actual conditions, they can adopt identical clock source and the identical multiplexing mode of pseudo-code generator.
In the present embodiment, on the selection principle of dynamic encryption parameter alpha any real number, but because periodic the existence, α chooses the real number between [0,4] or [2,2] usually.For fixing α, have only the criterion of an optimum to recover original information signal in theory from the signal after encrypting, promptly the signal after encrypting is done the four-item weight class fractional Fourier transform of parameter for-α.Because the flexibility that α selects makes system user to encrypt signal according to the different encryption parameter of actual conditions Dynamic Selection.When selection of parameter is proper, coded signal will present class Gauss's distribution character.
In order to resist of the scanning of non-purpose receiver, introduce real vector M V of dynamic encryption and NV to encryption parameter α.When dynamic encryption reality vector M V=NV=0, when if input signal is the random signal of process digital modulation (MPSK or MQAM), change along with parameter alpha, the real part of signal and imaginary part will be distinguished Gaussian distributed after the conversion, these characteristics make the signal after the conversion have and the white Gaussian noise similarity, and then can play the effect of signal encryption; When the real vector M V of dynamic encryption and NV are not zero entirely; signal after the conversion will present more complicated variation; can be so that the variation of " constellation division " appears in the signal after the conversion; and then with the camouflage after modulation constellation protect original modulation intelligence; just the number of constellation points of Ju Jiing is counted many than modulation constellation before encrypting; utilize this characteristic can confuse non-purpose receiver, make it do the judgement that makes mistake.
The concrete steps of encrypting are:
One, the signal to be encrypted that becomes plural form after the binary data process baseband modulation that data source provides gives encrypting module to encrypt, and wherein the baseband modulation mode is MPSK or MQAM digital modulation mode;
Two, encrypting module is encrypted four data sequences respectively simultaneously frame by frame, and the frame length of data sequence is the length of discrete Fourier transform (DFT), can select flexibly according to actual conditions, chooses 2 integral number power usually.The core of encrypting promptly is weighted summation to the data sequence, and four data sequences are followed successively by: sequence after the sequence after the be-encrypted data sequence of input, the be-encrypted data sequence process discrete Fourier transform (DFT), the be-encrypted data sequence process counter-rotating resume module and be-encrypted data sequence are successively through the sequence after discrete Fourier transform (DFT) and the counter-rotating resume module; According to encryption parameter α and the real vector M V of dynamic encryption, the NV of Dynamic Selection, and by coefficient generation module generation weight coefficient w 0, w 1, w 2, w 3Be weighted summation to being weighted data sequence;
Three, the sequence of complex numbers after the weighting is carried out digital carrier modulation back output, be the signal after the encryption.
The concrete steps of deciphering are:
(1), after the data that receive is changed through A/D, the coherent demodulation of at first carrying out digital carrier obtains in-phase component and quadrature component, and carrying out the Synchronous Processing of sequence after as the corresponding addition of imaginary part as real part, quadrature component with in-phase component, output sequence is sequence of complex numbers to be deciphered synchronously;
(2), to do parameter be the four-item weight class fractional Fourier transform of MV and NV for-α, the closely knit vector of dynamic resolution to the sequence of complex numbers for the treatment of deciphering, detailed process is identical with ciphering process, sequence after the conversion is the sequence after the deciphering, can transfer to the base band demodulating module and carry out next step work.
The dynamic change strategy of dynamic encryption parameter alpha is described: the complete period B of dynamic encryption parameter alpha in conjunction with Fig. 3 α=4 have been divided into 8 groups, promptly are divided into α 1, α 2, α 3, α 4, α 5, α 6, α 7And α 8, each group is divided into 2 parts again, and wherein same group two parts at a distance of 2, correspond respectively to pseudo noise code and be 0 and the interval of 1 o'clock output parameter.B FBe the size between each group parameter region, the parameter protection scope when also being each frame data conversion.T FBe the time that each frame data continues, T CBe the cycle of parameter saltus step, T in the strategy shown in the figure C=3T F, this ratio can be adjusted as required.The order of parameter transformation is in the strategy: α 1, α 6, α 7, α 3, α 8, α 2, α 4, α 5..., this is to set in advance in proper order, also can adjust as required in good time.
Illustrate that in conjunction with Fig. 3, Fig. 4 and Fig. 5 the variation strategy of real vector M V of dynamic encryption and NV is:
A, the variation strategy when each isolated component among real vector M V of dynamic encryption and the NV adopts same PN (pseudo noise code) sequence are:
A, in conjunction with Fig. 3 explanation when the period T of PN sequence in the parameter saltus step CIn 4 frame period T are arranged FThe time, the one-component m in the corresponding successively real vector of the frame of each PN sequence iOr n i(l=0,1,2,3), each component have only two kinds of value condition, and promptly 0 or 1.
B, in conjunction with Fig. 4 explanation when the period T of PN sequence in the parameter saltus step CIn 16 frame period T are arranged FThe time, the one-component in the corresponding real vector of per 4 PN sequence chips, promptly each component equals the decimal number that one 4 bit is represented.
C, when the period T of PN sequence in the parameter saltus step C4 frame period T of interior less than FThe time, with the period T of PN sequence in the parameter saltus step CIn carry out periodic extension and make it have 4 frame period T FAfter, implementation strategy a again.
D, when the period T of PN sequence in the parameter saltus step C16 frame period T of interior less than FThe time, with the period T of PN sequence in the parameter saltus step CIn carry out periodic extension and make it have 4 frame period T FAfter, implementation strategy b again.
B, in conjunction with Fig. 5 explanation variation strategy when the real vector M V of dynamic encryption adopts different PN sequences with each isolated component among the NV or adopt the different original position of same PN sign indicating number be: each isolated component is according to the rule variation of the PN sequence that is adopted.
Present embodiment all can be realized by DSP (Digital Signal Processing), FPGA (field programmable gate array) or FPGA+DSP.Present embodiment can adopt the system configuration of parallel or serial, and wherein parallel organization is more suitable in FPGA, and serial structure is more suitable in DSP; If adopt FPGA+DSP or other hardware structures, then can be according to the suitable Adjustment System structure of actual conditions.

Claims (6)

1, maintaining secrecy and decryption method based on the four-item weight FRFT of variable element communication, at transmitter terminal, data source is given encrypting module through after the baseband modulation, encrypting module carries out four-item weight score Fourier conversion to data under the control of dynamic encryption parameter alpha, the real vector M V of dynamic encryption and NV, transmit through sending into channel after the upconverter through the D/A conversion through the coded signal behind the digital carrier modulation module again; At receiver end, be sent to deciphering module through the data after low-converter and the A/D sampling, in deciphering module, at first pass through digital carrier coherent demodulation module, then pass through dynamic deciphering parameter-α again, the closely knit vector M V of dynamic resolution, after the four-item weight score Fourier conversion of NV control, obtain decrypted signal, carry out base band demodulating work then, it is characterized in that described dynamic encryption parameter alpha, real vector M V of dynamic encryption and NV, dynamically deciphering parameter-α and the closely knit vector M V of dynamic resolution and NV all use the dynamic parameter selection module of same structure to realize encrypting or deciphering parameter dynamically changes work, and this change all is to produce by the pseudo noise code of special speed with parameter changing pattern that pseudo noise code adapts.
What 2, the four-item weight FRFT based on variable element according to claim 1 communicated by letter maintains secrecy and decryption method, it is characterized in that the concrete steps of encrypting are:
One, the signal to be encrypted that becomes plural form after the binary data process baseband modulation that data source provides gives encrypting module to encrypt, and wherein the baseband modulation mode is MPSK or MQAM digital modulation mode;
Two, encrypting module is encrypted four data sequences respectively simultaneously frame by frame, and the frame length of data sequence is the length of discrete Fourier transform (DFT), chooses 2 integral number power; The core of encrypting promptly is weighted summation to the data sequence, and four data sequences are followed successively by: sequence after the sequence after the be-encrypted data sequence of input, the be-encrypted data sequence process discrete Fourier transform (DFT), the be-encrypted data sequence process counter-rotating resume module and be-encrypted data sequence are successively through the sequence after discrete Fourier transform (DFT) and the counter-rotating resume module; According to encryption parameter α and the real vector M V of dynamic encryption, the NV of Dynamic Selection, and by coefficient generation module generation weight coefficient w 0, w 1, w 2, w 3Be weighted summation to being weighted data sequence;
Three, the sequence of complex numbers after the weighting is carried out digital carrier modulation back output, be the signal after the encryption.
What 3, the four-item weight FRFT based on variable element according to claim 1 communicated by letter maintains secrecy and decryption method, it is characterized in that the concrete steps of deciphering are
(1), after the data that receive is changed through A/D, the coherent demodulation of at first carrying out digital carrier obtains in-phase component and quadrature component, and carrying out the Synchronous Processing of sequence after as the corresponding addition of imaginary part as real part, quadrature component with in-phase component, output sequence is sequence of complex numbers to be deciphered synchronously;
(2), to do parameter be the four-item weight class fractional Fourier transform of MV and NV for-α, the closely knit vector of dynamic resolution for the sequence of complex numbers for the treatment of deciphering, the sequence after the conversion is the sequence after the deciphering, can transfer to the base band demodulating module and carry out next step work.
4, according to maintaining secrecy and decryption method that claim 2 is communicated by letter with 3 described four-item weight FRFT based on variable element, it is characterized in that the dynamic change strategy of dynamic encryption parameter alpha is: the complete period B of dynamic encryption parameter alpha α=4 have been divided into 8 groups, promptly are divided into α 1, α 2, α 3, α 4, α 5, α 6, α 7And α 8, each group is divided into 2 parts again, and wherein same group two parts at a distance of 2, correspond respectively to pseudo noise code and be 0 and the interval of 1 o'clock output parameter, B FBe the size between each group parameter region, the parameter protection scope during each frame data conversion just, T FBe the time that each frame data continues, T CBe the cycle of parameter saltus step, T in the strategy C=3T F, this ratio can be adjusted as required, and the order of parameter transformation is in the strategy: α 1, α 6, α 7, α 3, α 8, α 2, α 4, α 5..., this is to set in advance in proper order.
What 5, the four-item weight FRFT based on variable element according to claim 4 communicated by letter maintains secrecy and decryption method, it is characterized in that the dynamic change strategy of real vector M V of dynamic encryption and NV is:
A, the variation strategy when each isolated component among real vector M V of dynamic encryption and the NV adopts same PN (pseudo noise code) sequence are:
A, when the period T of PN sequence in the parameter saltus step CIn 4 frame period T are arranged FThe time, the one-component m in the corresponding successively real vector of the frame of each PN sequence iOr n i(l=0,1,2,3), each component have only two kinds of value condition, and promptly 0 or 1;
B, when the period T of PN sequence in the parameter saltus step CIn 16 frame period T are arranged FThe time, the one-component in the corresponding real vector of per 4 PN sequence chips, promptly each component equals the decimal number that one 4 bit is represented;
C, when the period T of PN sequence in the parameter saltus step C4 frame period T of interior less than FThe time, with the period T of PN sequence in the parameter saltus step CIn carry out periodic extension and make it have 4 frame period T FAfter, implementation strategy a again;
D, when the period T of PN sequence in the parameter saltus step C16 frame period T of interior less than FThe time, with the period T of PN sequence in the parameter saltus step CIn carry out periodic extension and make it have 4 frame period T FAfter, implementation strategy b again;
B, the variation strategy when the real vector M V of dynamic encryption adopts different PN sequences with each isolated component among the NV or adopt the different original position of same PN sign indicating number are: each isolated component changes according to the rule of the PN sequence that is adopted.
What 6, the four-item weight FRFT based on variable element according to claim 5 communicated by letter maintains secrecy and decryption method, it is characterized in that it is by DSP, FPGA or FPGA+DSP realization.
CN200810136941A 2008-08-15 2008-08-15 Encryption and decryption method for four-item weight FRFT communication based on variable parameter Active CN101345618B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810136941A CN101345618B (en) 2008-08-15 2008-08-15 Encryption and decryption method for four-item weight FRFT communication based on variable parameter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810136941A CN101345618B (en) 2008-08-15 2008-08-15 Encryption and decryption method for four-item weight FRFT communication based on variable parameter

Publications (2)

Publication Number Publication Date
CN101345618A true CN101345618A (en) 2009-01-14
CN101345618B CN101345618B (en) 2012-09-19

Family

ID=40247515

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810136941A Active CN101345618B (en) 2008-08-15 2008-08-15 Encryption and decryption method for four-item weight FRFT communication based on variable parameter

Country Status (1)

Country Link
CN (1) CN101345618B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345616B (en) * 2008-08-15 2010-12-08 哈尔滨工业大学 Communication encryption and decryption method of four-item weight score Fourier transform based on multi-parameter
CN101771530B (en) * 2010-01-26 2012-08-15 哈尔滨工业大学 Covert communication method for concealing weighted signal by using common signal sequence
CN109450599A (en) * 2018-11-20 2019-03-08 沈阳理工大学 A kind of compatibility scan method of multinomial score field Fourier regeneration transformation
CN112291034A (en) * 2020-10-22 2021-01-29 南京邮电大学 Satellite overlapping communication method for safety communication demand

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212259A (en) * 2006-12-31 2008-07-02 电子科技大学 Fractional Fourier transform and fuzzy transform based primary function optimization design method for transform domain under complex interference
CN101166066B (en) * 2007-07-24 2010-10-06 哈尔滨工程大学 A mobile water sound communication method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345616B (en) * 2008-08-15 2010-12-08 哈尔滨工业大学 Communication encryption and decryption method of four-item weight score Fourier transform based on multi-parameter
CN101771530B (en) * 2010-01-26 2012-08-15 哈尔滨工业大学 Covert communication method for concealing weighted signal by using common signal sequence
CN109450599A (en) * 2018-11-20 2019-03-08 沈阳理工大学 A kind of compatibility scan method of multinomial score field Fourier regeneration transformation
CN109450599B (en) * 2018-11-20 2021-01-12 沈阳理工大学 Compatible scanning method for Fourier regeneration transformation of multi-term fractional domain
CN112291034A (en) * 2020-10-22 2021-01-29 南京邮电大学 Satellite overlapping communication method for safety communication demand
CN112291034B (en) * 2020-10-22 2022-05-17 南京邮电大学 Satellite overlapping communication method for safety communication demand

Also Published As

Publication number Publication date
CN101345618B (en) 2012-09-19

Similar Documents

Publication Publication Date Title
US11734435B2 (en) Image encryption and decryption communication algorithm based on two-dimensional lag complex logistic map
Fu et al. A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy
CN102833736B (en) Communication key generation method and secure channel selection method for cognitive radio system
Hirota Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol
CN101345616B (en) Communication encryption and decryption method of four-item weight score Fourier transform based on multi-parameter
CN101702117A (en) Method for generating random pseudorandom sequence based on discrete progressive determinacy
CN102201914B (en) Secret communication method based on multi-dimensional single/multi-parameter four-weighted fractional Fourier transform
CN110677236B (en) OFDM encryption method based on composite chaotic system and XOR operation
CN110167023B (en) Navigation signal encryption authentication method
CN101834815A (en) Method for resisting interception and inference for signals based on quadrinomial weighted fractional Fourier transform of multiple-path variable parameters
CN101345618B (en) Encryption and decryption method for four-item weight FRFT communication based on variable parameter
CN111970693A (en) Low-complexity LoRa Internet of things safety encryption method based on physical layer waveforms
CN110635896B (en) Blind parameter estimation method for continuous variable quantum key distribution
Gutub Dynamic smart random preference for higher medical image confidentiality
CN103078817B (en) Based on the variable element frequency expansion sequence low detection probability signal launching and receiving method of weight score Fourier conversion
JP4889630B2 (en) Optical transmission apparatus and method for ciphertext transmission
CN107819760A (en) Symmetric key generation and the secret signalling of distribution based on radio channel characteristic
CN205725790U (en) The OOFDM encryption system mapped based on chaos sequence
Kar et al. RGB image encryption using hyper chaotic system
JP4461224B2 (en) Cryptographic transmitter
CN101702116A (en) Pseudorandom sequence generating method based on progressive deterministic random
CN101645772A (en) Pseudo random sequence generation method based on t semi-order and sequence generator
CN115225249A (en) MP-WFRFT communication method and system based on multi-cascade chaotic encryption
RU2447598C1 (en) Coherent radio line
Tian et al. High Anti-Interception Orbital Angular Momentum Spread Spectrum Communications Systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant